Stellar Cyber and Deep Instinct integrate to help enterprises identify threats

Stellar Cyber and Deep Instinct integration makes it easy for enterprise and MSSP customers using the Stellar Cyber Open XDR platform to deliver Deep Instinct’s prevention capabilities across the... Read more »

Palo Alto Networks and Google Cloud secure work from anywhere regardless of device type

Palo Alto Networks has expanded partnership that brings together BeyondCorp Enterprise from Google Cloud and Prisma Access from Palo Alto Networks to provide hybrid users secure and seamless access... Read more »

DH2i partners with Red Hat to accelerate container application deployments

DH2i’s DxEnterprise multi-platform smart high availability clustering software has earned Red Hat OpenShift certification on Red Hat Enterprise Linux. This certification verifies that DxEnterprise is a containerized solution that... Read more »

FireTail raises $5 million to improve API Security

FireTail has closed $5 million in early stage financing led by Paladin Capital Group, with participation from Zscaler, General Advance, Secure Octane, and a cadre of high-profile cyber security... Read more »

Anand Akela joins Acalvio as CMO

As Acalvio Technologies CMO, Anand Akela will play an integral role in driving the company’s marketing strategy as the company expands into identity threat detection and response (ITDR). With... Read more »

Skybox Security appoints Corey Williams as CMO

Corey Williams will leverage his extensive cybersecurity background to lead Skybox Security’s core marketing strategy and accelerate market growth. The seasoned marketing executive brings 25 years of experience leading... Read more »

OSV-Scanner: A free vulnerability scanner for open-source software

After releasing the Open Source Vulnerabilities database (OSV.dev) in February, Google has launched the OSV-Scanner, a free command line vulnerability scanner that open source developers can use to check... Read more »

3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the... Read more »

How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can blindside... Read more »

Nosey Parker: Find sensitive information in textual data and Git history

Praetorian has open-sourced the regular expression-based (RegEx) scanning capabilities of its Nosey Parker secret scanning tool. Scanning filesystem content for secrets Inadvertent secrets disclosure is one of an organization’s... Read more »
Subscribe to our Newsletter